Search Results for Data protection. - Narrowed by: Online Library - 2008 - Computer Communication Networks. - Data encryption (Computer science). - Information systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$002509Data$002bencryption$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026ps$003d300?
2024-09-02T07:14:14Z
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:189044
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Buchmann, Johannes. editor. Ding, Jintai. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88403-3">http://dx.doi.org/10.1007/978-3-540-88403-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Hiding 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189164
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Solanki, Kaushal. editor. Sullivan, Kenneth. editor. Madhow, Upamanyu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88961-8">http://dx.doi.org/10.1007/978-3-540-88961-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185647
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Bellovin, Steven M. editor. Gennaro, Rosario. editor. Keromytis, Angelos. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trusted Computing - Challenges and Applications First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185674
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Lipp, Peter. editor. Sadeghi, Ahmad-Reza. editor. Koch, Klaus-Michael. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-68979-9">http://dx.doi.org/10.1007/978-3-540-68979-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Autonomic and Trusted Computing 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Proceedings
ent://SD_ILS/0/SD_ILS:185771
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Rong, Chunming. editor. Jaatun, Martin Gilje. editor. Sandnes, Frode Eika. editor. Yang, Laurence T. editor. Ma, Jianhua. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69295-9">http://dx.doi.org/10.1007/978-3-540-69295-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:185814
2024-09-02T07:14:14Z
2024-09-02T07:14:14Z
Author Jahankhani, Hamid. editor. Revett, Kenneth. editor. Palmer-Brown, Dominic. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>